Keywords

1 Introduction

Due to the advantages of ubiquitous coverage, no limitation on user geographic position and low user expenditure, satellite communication (SATCOM) system is expected to play a significant role in facilitating the application and commercialization of wireless networks. However, compared with terrestrial communication systems, SATCOM system is much more vulnerable to eavesdropping and jamming attacks, caused by its inherent openness and bad communication conditions (i.e., precipitation attenuation, sky noise, gaseous absorption) [1]. As a result, improving the secrecy performance for SATCOM system is of great importance.

In the past, security in space missions mainly depends on upper layers by cryptographic encryption and decryption mechanisms [2]. However, the features of SATCOM networks, such as the high mobility and limited resources carried by satellites, lead to great difficulties in secret key distribution and management [3, 4]. Hence, cryptographic methods cannot completely meet the security demands of satellite communication systems.

Conversely, physical layer (PHY) security based on information-theoretic security [5] has been commonly recognized as the strictest form of security by exploiting the inherent randomness of wireless channels. A basic framework of PHY security, the wiretap channel, was pioneered by Wyner [6] and extended to broadcast channels by Csiszár and Körner [7]. Later, there has been an increasing attraction on physical layer security to guarantee secure terrestrial wireless communication. The concept of secrecy rate is referred to as a rate at which the message can be reliably transmitted but eavesdroppers get no information about the message [3]. To guarantee positive secrecy rate, the legitimate users should have better signal-to-noise ratios (SNRs) than the unintended users. The techniques of multiple-input multiple-output (MIMO) antennas are helpful to improve the security of communication even when legitimate receivers have bad SNRs [3, 8, 9]. Different secrecy metrics are proposed to evaluate system security under various terrestrial communication scenarios, such as secrecy capacity and secrecy outage probability (SOP) [10,11,12,13].

However, there are few works focusing on the PHY security for satellite communication systems with multiple legitimate users. Some of the existed researches are interested in land mobile satellite communication systems or hybrid satellite-terrestrial networks based on Shadowed-Rician model [14,15,16,17], while others mainly pay attention to the secrecy transmission of multibeam SATCOM systems [2, 18, 19]. Multibeam satellite can enhance the channel qualities of intended receivers by generating beams through multiple antenna feeds. In this paper, for the first time, we explore the security performance for a multibeam satellite system with multiple receivers subjected to co-channel inference. A method originating from null-steering beamforming technique [20] is adopted to improve the secrecy rate of each intended user and then we also give out the corresponding derivation of beamforming vector. Finally, simulation and numerical results are carried out to show the secrecy performance of multiform SATCOM systems.

The remainder of this paper is structured as follows. The multibeam satellite system model and problem formulation are introduced in Sect. 2. The beamforming scheme as well as secrecy outage analysis is shown in Sect. 3. Section 4 presents the numerical results, and we conclude the paper in Sect. 5.

Throughout this paper, a number of notations will be adopted. Bold uppercase letters and bold lowercase letters denote matrices and vectors, respectively. \(|\cdot |\) represents the modulus of a scalar. \(||\cdot ||\) is the Euclidean norm for a vector. The mean of a random variable is represented by \(\mathbb {E}[\cdot ]\). Hermitian transpose and inverse are represented by \((\cdot )^{\mathrm {\dagger }}\) and \((\cdot )^{-1}\), respectively. \(\mathbf A \odot \mathbf B \) denotes Hadamard product of two matrices. \(\mathbf {I}_{N}\) is an \(N\times \) \(N\) identity matrix. \(\mathcal {N}(\mu ,\sigma ^{2})\) denotes the Gaussian distribution with mean \(\mu \) and variance \(\sigma ^{2}\). \(\textit{J}_{k}\) represents the first kind Bessel function of order k.

2 System Model

We consider the downlink of a multibeam satellite communication system with a geostationary satellite, which generates N co-channel beams on the ground via N corresponding antenna feeds (single-feed per beam) leading to a frequency reuse of one, as shown in Fig. 1. There are M (\(M<N\)) active fixed legitimate users receiving independent data streams from the satellite. The transmit power allocated to each beam is no more than \(P_{0}\) and it is assumed that at any given time, each beam only serves one legitimate receiver at most. Moreover, we consider that there is a single eavesdropper located in the beam of each legitimate receiver. The overall channels of legitimate users and eavesdroppers can be expressed as

$$\begin{aligned} \mathbf {H}=\left[ \mathbf {h}_{1},\mathbf {h}_{2},\ldots ,\mathbf {h}_{M}\right] \end{aligned}$$
(1)

and

$$\begin{aligned} \mathbf {G}=\left[ \mathbf {g}_{1},\mathbf {g}_{2},\ldots ,\mathbf {g}_{M}\right] , \end{aligned}$$
(2)

where \(\mathbf {h}_{k}\) is an \(N\times 1\) vector and presents the channel of legitimate user k, and \(\mathbf {g}_{k}\) is an \(N\times 1\) vector and presents the channel of the corresponding eavesdropper in the same beam k.

Fig. 1.
figure 1

Multibeam satellite communication scenario.

2.1 Channel Model

Unlike terrestrial communication systems, the satellite systems applying Ka band are subjected to various atmospheric fading mechanisms originating in the troposphere, which heavily affects system performance and availability [1]. Hence, it is essential to take the impact of the troposphere, especially, rain attenuation into consideration. Since rain attenuation is a long term effect, we assume that receivers will suffer from the same fading if located within the same beam but independent fading among different beams.

Rain Attenuation. To predict the rain attenuation effect, this paper employs the empirical model proposed in ITU-R Recommendation P.618-12 [21]. The final power gain in dB (\(\xi {}_{dB}=20\log _{10}\left( \xi \right) \)) is modeled as a lognormal random \(\ln \left( \xi {}_{dB}\right) \sim \mathcal {N}\left( \mu ,\sigma \right) \), where \(\mu \) and \(\sigma \) rely on the location of the receiver and the state of the satellite. The corresponding \(N\times 1\) rain fading vector from all antenna feeds towards a single terminal antenna is given by [2, 22]

$$\begin{aligned} \mathbf {a}=\xi ^{-\frac{1}{2}}e^{-j\mathbf {\varPhi }}, \end{aligned}$$
(3)

where \(\mathbf {\varPhi }\) denotes an \(N\times 1\) phase vector following uniform distribution over [\(0,2\pi \)).

Beam Gain. The beam gain matrix describes the average signal to interference-plus-noise ratios (SINR) at each user. It mainly relies on the satellite antenna beam pattern and the receiver position. We consider a radiation pattern given by [23]:

$$\begin{aligned} b_{k}\left( u\right) =B_{k}^{max}\cdot \left( \frac{J_{1}\left( u\right) }{2u}+36\frac{J_{3}(u)}{u^{3}}\right) ^{2}, \end{aligned}$$
(4)

where \(u=2.07123\sin \theta _{k}/\sin \left( \theta _{3dB}\right) _{k}\), \(\theta _{k}\) represents the angle between the receiver location and the k-th beam center as seen from the satellite and the coefficient, \(B_{k}^{max}\) is the maximum beam gain, \(J_{1}\) and \(J_{3}\) denote, respectively, the first kind Bessel functions of order 1 and 3.

Consequently, the overall channel for a certain user can be expressed as

$$\begin{aligned} \widetilde{\mathbf {h}}=\mathbf {a\odot b}, \end{aligned}$$
(5)

where \(\mathbf {b}\) is an \(N\times 1\) vector and represents the beam gain of the user collected from all transmit antennas.

2.2 Signal Model

Let \(s_{k}\) be the data for user k with unit average power \(\mathbb {E}\left[ s_{k}^{2}\right] =1,\forall k\). Before transmission, the satellite employs transmit beamforming to communicate with legitimate receivers, and the corresponding beamforming vector is denoted by \(\mathbf {w}_{k}\in \mathbb {C}^{N\times 1}\). Hence, the on board transmitted signal can be expressed as

$$\begin{aligned} \mathbf {x}=\sum _{k=1}^{M}\mathbf {w}_{k}s_{k}. \end{aligned}$$
(6)

The received signal at the m-th legitimate receiver is given by

$$\begin{aligned} y_{m}=\mathbf {h}_{m}^{\mathrm {\dagger }}\mathbf {w}_{m}s_{m}+\mathbf {h}_{m}^{\mathrm {\dagger }}\sum _{k=1,k\ne m}^{M}\mathbf {w}_{k}s_{k}+n_{m}, \end{aligned}$$
(7)

and the signal received by its corresponding eavesdropper is determined as

$$\begin{aligned} y_{m}^{e}=\mathbf {g}_{m}^{\mathrm {\dagger }}\mathbf {w}_{m}s_{m}+\mathbf {g}_{m}^{\mathrm {\dagger }}\sum _{k=1,k\ne m}^{M}\mathbf {w}_{k}s_{k}+n_{e}, \end{aligned}$$
(8)

where \(n_{k}\) and \(n_{e}\) are the additive Gaussian noises at the m-th legitimate user and the eavesdropper surrounding it, which respectively satisfy \(n_{m}\sim \mathcal {N}(0,\sigma _{D}^{2})\) and \(n_{e}\sim \mathcal {N}(0,\sigma _{E}^{2})\). The term \({h}_{m}^{\mathrm {\dagger }}\mathbf {w}_{m}s_{m}\) is the desired signal at the m-th legitimate user, while \({h}_{m}^{\mathrm {\dagger }}\sum _{k=1,k\ne m}^{M}\mathbf {w}_{k}s_{k}\) is the co-channel interference.

Hence, the achievable secrecy rate [24] of the legitimate receiver m can be calculated as

$$\begin{aligned} C_{m}^{s}=&\log _{2}\left( 1+\frac{\left| \mathbf {h}_{m}^{\mathrm {\dagger }}\mathbf {w}_{m}\right| ^{2}}{\sum _{k=1,k\ne m}^{M}\left| \mathbf {h}_{k}^{\mathrm {\dagger }}\mathbf {w}_{k}\right| ^{2}+\sigma _{D}^{2}}\right) \nonumber \\&-\log _{2}\left( 1+\frac{\left| \mathbf {g}_{m}^{\mathrm {\dagger }}\mathbf {w}_{m}\right| ^{2}}{\sum _{k=1,k\ne m}^{M}\left| \mathbf {g}_{k}^{\mathrm {\dagger }}\mathbf {w}_{k}\right| ^{2}+\sigma _{D}^{2}}\right) . \end{aligned}$$
(9)

2.3 Problem Formulation

In this paper, we are interested in maximizing the achievable secrecy rate for each intended user, while subjecting to the transmit power constraint \(P_{0}\) for each individual transmit signal, which can be formally formulated as the following optimization problem:

$$\begin{aligned}&\arg \max _{\mathbf {w}}\quad C_{m}^{s}\nonumber \\&s{.}t{.}\qquad \quad \left\| \mathbf {w}_{m}\right\| <P_{0}. \end{aligned}$$
(10)

3 Beamforming Vectors and Secrecy Outage Analysis

3.1 Complete Zero-Forcing

In this section, we consider a beamforming design in [18], named complete zero-forcing, to maximize the achievable secrecy rate \(C_{m}^{s}\). By use of complete ZF, not only signals at all eavesdroppers are nulled out, but co-channel interference among all users is also completely eliminated. Then we have

$$\begin{aligned} \mathbf {w}_{m}^{\mathrm {\dagger }}\mathbf {h}_{k}=0,\forall k\ne m\quad \text {and} \quad \mathbf {w}_{m}^{\mathrm {\dagger }}\mathbf {g}_{m}=0,\forall m, \end{aligned}$$
(11)

which makes the achievable secrecy rate of the legitimate receiver m simplified to

$$\begin{aligned} C_{m}^{s}=\log _{2}\left( 1+\frac{\left| \mathbf {h}_{m}^{\mathrm {\dagger }}\mathbf {w}_{m}\right| ^{2}}{\sigma _{D}^{2}}\right) . \end{aligned}$$
(12)

3.2 Problem Solution

The optimization problem in (10) can be reformulated as

$$\begin{aligned}&\arg \max _{\mathbf {w}}\quad C_{m}^{s}\nonumber \\&s{.}t{.}\qquad \quad \,\mathbf {w}_{m}^{\mathrm {\dagger }}\mathbf {h}_{k}=0,\quad \forall k\ne m \nonumber \\&\qquad \qquad \,\ \mathbf {w}_{m}^{\mathrm {\dagger }}\mathbf {g}_{m}=0 \nonumber \\&\qquad \qquad \,\ \mathbf {w}_{m}^{\mathrm {\dagger }}\mathbf {w}_{m} =P_{0} \end{aligned}$$
(13)

and further formulated as

$$\begin{aligned} \begin{aligned}&\arg \max _{\mathbf {w}}\quad C_{m}^{s}\\&s{.}t{.}\qquad \quad \,\mathbf {\Delta ^{\dagger }}\mathbf {w}_{m}={\mathbf {0}}_{1\times M}\\&\qquad \qquad \,\ \mathbf {w}_{m}^{\mathrm {\dagger }}\mathbf {w}_{m} =P_{0} \end{aligned} , \end{aligned}$$
(14)

where

$$\begin{aligned} \left[ \mathbf {\Delta }\right] _{ij}={\left\{ \begin{array}{ll}\left[ \mathbf {H}\right] _{ij} &{} j\ne m\\ \left[ \mathbf {G}\right] _{ij} &{} j= m\end{array}\right. }. \end{aligned}$$
(15)

Here, H and G describes the overall channel of all legitimate users and all eavesdroppers mentioned in Sect. 2, respectively.

The problem in (14) could be obtained by the knowledge of null-steering beamformer and its optimal solution is given by as [25]

$$\begin{aligned} \mathbf {w}_{m}=\frac{\sqrt{P_{0}}}{\left\| \left( \mathbf {I}_{N}-\mathbf {F}\right) \mathbf {h}_{m}\right\| }\left( \mathbf {I}_{N}-\mathbf {F}\right) \mathbf {h}_{m}, \end{aligned}$$
(16)

where \(\mathbf {F}=\varDelta \left( \varDelta ^{\dagger }\varDelta \right) ^{-1}\varDelta ^{\dagger }\) and \(\mathbf {I}_{N}\) is an \(N\times \) \(N\) identity matrix.

3.3 Secrecy Outage Analysis

In order to evaluate the secrecy performance of the satellite system in this paper, secrecy outage probability is introduced. It expresses the probability that secrecy outage event occurs. Secrecy outage event of an intended user m will occur in the case that its achievable secrecy rate falls below a predefined confidential information rate \(\varepsilon _{m}\). The secrecy outage probability is expressed as

$$\begin{aligned} P_{m}^{out}=Pr\left( C_{m}^{s}<\varepsilon _{m}\right) . \end{aligned}$$
(17)

Substituting achievable secrecy rate \(C_{m}^{s}\) from (12) into (17), the secrecy outage probability (SOP) of the legitimate user m can be rewritten as

$$\begin{aligned} P_{m}^{out}=Pr\left( \left| \mathbf {h}_{m}^{\mathrm {\dagger }}\mathbf {w}_{m}\right| ^{2}<\sigma _{D}^{2}\left( 2^{\varepsilon _{m}}-1\right) \right) . \end{aligned}$$
(18)

For the whole multibeam satellite system, we introduce two secrecy performance metric measurements in this paper. The first one is a statistic value based on the average SOP of all legitimate receivers

$$\begin{aligned} P_{average}^{out}=\frac{1}{M}\sum _{k=1}^{M}P_{m}^{out}, \end{aligned}$$
(19)

and the second one describes the probability that the system will be secrecy outaged once an intended user cannot keep secure communication with the satellite,

$$\begin{aligned} P_{strict}^{out}=1-\prod _{k=1}^{M}(1-P_{m}^{out}), \end{aligned}$$
(20)

which is a much strict standard.

4 Simulation Results Analysis

In this section, we investigate the secrecy outage probability (SOP) of the multibeam satellite communication (SATCOM) system with complete zero-forcing technique. For simplicity, we consider a system with \(M=3\) active beams and assume that all receivers set the same secrecy rate constraint \(\varepsilon _{m}=\varepsilon _{0},\forall m\). Each legitimate user is supposed to be located in the beam center while the distance between an unintended receiver and the corresponding legitimate receiver is randomly ranging from [0.15R, R), where R is the beam radius, as shown in Fig. 2. Some significant parameters of the multibeam SATCOM system in this paper are given in Table 1. We will present the secrecy performance of all legitimate users and the whole system, respectively and explore the factors that affect the secrecy performance. Note that aiming at evaluating the secrecy outage probability, this paper performs Monte Carlo experiments consisting of 10000 independent trials to obtain the average results.

Table 1. Main parameters of the multibeam satellite system.
Fig. 2.
figure 2

A specific multibeam SATCOM scenario.

Figure 3 depicts the results for the SOP of each user and the whole system against the secrecy rate constraint in the case that satellite only generates 4 beams. In Figs. 3 and 4, SOP_a and SOP_s correspond to \(P_{average}^{out}\) and \(P_{strict}^{out}\) mentioned in Sect. 3. It is observed that user 2 (the legitimate receiver in the 2nd beam) would be less likely secrecy outaged compared with others. Taking note that the distance between the legitimate receiver in the 2nd beam and the 4th beam center is larger, communication of user 2 suffers less co-channel interference from the 4th beam. Otherwise, we illustrate that in the view of \(P_{strict}^{out}\), the performance of system secrecy is mainly affected by those users with the worst performance.

Fig. 3.
figure 3

Secrecy outage probability vs. secrecy rate constraint.

Fig. 4.
figure 4

Secrecy outage probability vs. number of beams.

Figure 4 shows the secrecy outage probability of the system according to the number of beams generated by the satellite. The secrecy rate constraints are randomly selected as \([0.10\ 0.34\ 0.39]^{T}\). We can notice that two kinds of system SOP both decrease as the number of beams increases. And \(P_{strict}^{out}\) of the system is mainly dependent upon the user performing badly.

5 Conclusion

In this paper, we investigated the secrecy performance of a multibeam satellite communication system subject to transmit power constraint. Complete zero-forming technique, a kind of null-steering beamforming method, was adopted to eliminate co-channel interference. By analyzing the secrecy outage performance of both individual user and the whole system, we found that the secrecy outage probability will decrease as the active beam number increases but the secrecy rate constraint decreases. Simulation results have also shown the fact that the strict standard of system SOP is mainly affected by users with low channel quality.